EUROCRYPT A*

73 papers

YearTitle / Authors
1990Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings
Jean-Jacques Quisquater, Joos Vandewalle
19892n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms.
Jean-Jacques Quisquater, Marc Girault
1989A Cryptanalysis of Step
Dieter Gollmann, William G. Chambers
1989A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen
1989A Fast Elliptic Curve Cryptosystem.
Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone
1989A Fats Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences.
Réjane Forré
1989A General Zero-Knowledge Scheme (Extended Abstract).
Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
1989A Generalization of El Gamal's Public Key Cryptosystem.
Walter J. Jaburek
1989A Key Distribution System Based On Any One-Way Function (Extended Abstract).
George I. Davida, Yvo Desmedt, René Peralta
1989A New Multiple Key Cipher and an Improved Voting Scheme.
Colin Boyd
1989A Practical Protocol for Large Group Oriented Networks.
Yair Frankel
1989A Secure Public-key Authentication Scheme.
Zvi Galil, Stuart Haber, Moti Yung
1989A Simple Technique for Diffusing Cryptoperiods.
Stig Fr. Mjølsnes
1989A Single Chip 1024 Bits RSA Processor.
André Vandermeulebroecke, Etienne Vanzieleghem, Tony Denayer, Paul G. A. Jespers
1989An Alternative to the Fiat-Shamir Protocol.
Jacques Stern
1989An Identity-Based Key-Exchange Protocol.
Christoph G. Günther
1989An Information-Theoretic Treatment of Homophonic Substitution.
Hakon N. Jendal, Yves J. B. Kuhn, James L. Massey
1989Atkin's Test: News From the Front.
François Morain
1989Cartesian Authentication Schemes.
Marijke De Soete, Klaus Vedder, Michael Walker
1989Counting Functions Satisfying a Higher Order Strict Avalanche Criterion.
Sheelagh Lloyd
1989Cryptanalysis of Short RSA Secret Exponents (Abstract).
Michael J. Wiener
1989Cryptanalysis of Video Encryption Based on Space-Filling Curves.
Michael Bertilsson, Ernest F. Brickell, Ingemar Ingemarsson
1989Cryptanalysis of a Modified Rotor Machine.
Peer Wichmann
1989Cryptel - The Practical Protection of an Existing Electronic Mail System.
Hedwig Cnudde
1989Deciphering Bronze Age Scripts of Crete - The Case of Linear A.
Yves Duhoux
1989Detection of Disrupters in the DC Protocol.
Jurjen N. Bos, Bert den Boer
1989Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility.
Tatsuaki Okamoto, Kazuo Ohta
1989Efficient Identification and Signatures for Smart Cards (Abstract).
Claus-Peter Schnorr
1989Efficient Offline Electronic Checks (Extended Abstract).
David Chaum, Bert den Boer, Eugène van Heyst, Stig Fr. Mjølsnes, Adri Steenbeek
1989Everything in NP can be Argued in
Gilles Brassard, Claude Crépeau, Moti Yung
1989Factoring by Electronic Mail.
Arjen K. Lenstra, Mark S. Manasse
1989Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity.
Ueli M. Maurer
1989Faster Primality Testing (Extended Abstract).
Wieb Bosma, Marc-Paul van der Hulst
1989Feedforward Functions Defined By de Bruijn Sequences.
Zong-Duo Dai, Kencheng Zeng
1989Full Secure Key Exchange and Authentication with no Previously Shared Secrets.
Josep Domingo-Ferrer, Llorenç Huguet i Rotger
1989How Easy is Collision Search? Application to DES (Extended Summary).
Jean-Jacques Quisquater, Jean-Paul Delescaille
1989How to Break the Direct RSA-Implementation of Mixes.
Birgit Pfitzmann, Andreas Pfitzmann
1989How to Improve Signature Schemes.
Gilles Brassard
1989How to Keep Authenticity Alive in a Computer Network.
Fritz Bauspieß, Hans-Joachim Knobloch
1989How to Say "No".
Albrecht Beutelspacher
1989Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
1989Informational Divergence Bounds for Authentication Codes.
Andrea Sgarro
1989Key Minimal Authentication Systems for Unconditional Secrecy.
Philippe Godlewski, Chris J. Mitchell
1989Keysystem Sequences with a Good Linear Complexity Profile for Every STrating Point.
Harald Niederreiter
1989Legal Requirements Facing New Signature Technology.
Mireille Antoine, Jean-François Brakeland, Marc Eloy, Yves Poullet
1989Linear Complexity Profiles and Continued Fractions.
Muzhong Wang
1989More Efficient Match-Making and Satisfiability:
Bert den Boer
1989Non-linearity of Exponent Permutations.
Josef Pieprzyk
1989Nonlinearity Criteria for Cryptographic Functions.
Willi Meier, Othmar Staffelbach
1989On the Complexity and Efficiency of a New Key Exchange System.
Johannes Buchmann, Stephan Düllmann, Hugh C. Williams
1989On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random.
Thomas Beth, Zong-Duo Dai
1989On the Design of Permutation P in DES Type Cryptosystems.
Lawrence Brown, Jennifer Seberry
1989On the Linear Complexity of Feedback Registers (Extended Abstract).
Agnes Hui Chan, Mark Goresky, Andrew Klapper
1989On the Security of Schnorr's Pseudo Random Generator.
Rainer A. Rueppel
1989Online Cash Checks.
David Chaum
1989Parallel Generation of Recurring Sequences.
Christoph G. Günther
1989Practical Zero-Knowledge Proofs: Giving Hints and Using Deficiencies.
Joan Boyar, Katalin Friedl, Carsten Lund
1989Prepositioned Shared Secret and/or Shared Control Schemes.
Gustavus J. Simmons
1989Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract).
Tzonelih Hwang, T. R. N. Rao
1989Random Mapping Statistics.
Philippe Flajolet, Andrew M. Odlyzko
1989Security in Open Distributed Processing.
Charles Siuda
1989Some Conditions on the Linear Complexity Profiles of Certain Binary Sequences.
Glyn Carter
1989Some Ideal Secret Sharing Schemes.
Ernest F. Brickell
1989Sorting out Zero-Knowledge.
Gilles Brassard, Claude Crépeau
1989Technical Security: The Starting Point.
Jan Van Auseloos
1989The Adolescence of Public-Key Cryptography (Abstract).
Whitfield Diffie
1989The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).
Michael Waidner, Birgit Pfitzmann
1989The Use of Fractions in Public-Key Cryptosystems.
Hartmut Isselhorst
1989Unconditional Sender and Recipient Untraceability in Spite of Active Attacks.
Michael Waidner
1989Varying Feedback Shift Registers.
Yves Roggeman
1989Verifiable Disclosure of Secrets and Applications (Abstract).
Claude Crépeau
1989Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary).
Jean-Jacques Quisquater, André Bouckaert
1989Zero-Knowledge Proofs of Computational Power (Extended Summary).
Moti Yung